Vulnerability Details : CVE-2006-6242
Potential exploit
Multiple directory traversal vulnerabilities in Serendipity 1.0.3 and earlier allow remote attackers to read or include arbitrary local files via a .. (dot dot) sequence in the serendipity[charset] parameter in (1) include/lang.inc.php; or to plugins/ scripts (2) serendipity_event_bbcode/serendipity_event_bbcode.php, (3) serendipity_event_browsercompatibility/serendipity_event_browsercompatibility.php, (4) serendipity_event_contentrewrite/serendipity_event_contentrewrite.php, (5) serendipity_event_creativecommons/serendipity_event_creativecommons.php, (6) serendipity_event_emoticate/serendipity_event_emoticate.php, (7) serendipity_event_entryproperties/serendipity_event_entryproperties.php, (8) serendipity_event_karma/serendipity_event_karma.php, (9) serendipity_event_livesearch/serendipity_event_livesearch.php, (10) serendipity_event_mailer/serendipity_event_mailer.php, (11) serendipity_event_nl2br/serendipity_event_nl2br.php, (12) serendipity_event_s9ymarkup/serendipity_event_s9ymarkup.php, (13) serendipity_event_searchhighlight/serendipity_event_searchhighlight.php, (14) serendipity_event_spamblock/serendipity_event_spamblock.php, (15) serendipity_event_spartacus/serendipity_event_spartacus.php, (16) serendipity_event_statistics/serendipity_plugin_statistics.php, (17) serendipity_event_templatechooser/serendipity_event_templatechooser.php, (18) serendipity_event_textile/serendipity_event_textile.php, (19) serendipity_event_textwiki/serendipity_event_textwiki.php, (20) serendipity_event_trackexits/serendipity_event_trackexits.php, (21) serendipity_event_weblogping/serendipity_event_weblogping.php, (22) serendipity_event_xhtmlcleanup/serendipity_event_xhtmlcleanup.php, (23) serendipity_plugin_comments/serendipity_plugin_comments.php, (24) serendipity_plugin_creativecommons/serendipity_plugin_creativecommons.php, (25) serendipity_plugin_entrylinks/serendipity_plugin_entrylinks.php, (26) serendipity_plugin_eventwrapper/serendipity_plugin_eventwrapper.php, (27) serendipity_plugin_history/serendipity_plugin_history.php, (28) serendipity_plugin_recententries/serendipity_plugin_recententries.php, (29) serendipity_plugin_remoterss/serendipity_plugin_remoterss.php, (30) serendipity_plugin_shoutbox/serendipity_plugin_shoutbox.php, and and (31) serendipity_plugin_templatedropdown/serendipity_plugin_templatedropdown.php.
Vulnerability category: Directory traversal
Products affected by CVE-2006-6242
- cpe:2.3:a:s9y:serendipity:0.6_pl3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.5:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.5_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_pl1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_pl2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.4:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.6_rc2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_beta1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8_beta5:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8_beta6:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0_beta2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:0.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0_beta3:*:*:*:*:*:*:*
- cpe:2.3:a:s9y:serendipity:1.0.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6242
3.66%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 87 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6242
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2006-6242
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-6242
Jump to